Implementing device operational modes using motion information or location information associated with a route
First Claim
1. A method of managing operation of a device, the method comprising:
- determining a destination and boundary associated with one or more items to be picked up or dropped off at the destination;
obtaining route information for a route to at least the destination, the route information including a threshold deviation of the route that is permissible;
storing customer information and information about the one or more items as first privileged data on the device;
storing the route information as second privileged data on the device;
determining a current location of the device relative to the boundary and the route;
causing the device to operate in an employee mode based at least in part on a determination by the device that the current location is outside of the boundary and within the threshold deviation of the route, operation in the employee mode at least causing display of at least some of the second privileged data;
causing the device to operate in a customer mode based at least in part on a determination by the device that the current location is within the boundary, operation in the customer mode at least causing display of at least some of the first privileged data while restricting access of at least the second privileged data; and
causing the device to operate in a secure mode based at least in part on a determination by the device that the current location is outside of the boundary and outside of the threshold deviation of the route, operation in the secure mode restricting access, at least temporarily, to the first privileged data and the second privileged data.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure is directed to controlling operation of a deployed device to selectively initiate different operational modes, which may include an employee mode, a customer mode, and/or a secure mode. While operating in the employee mode and/or customer mode, the deployed device may enable some access to information specified for the respective user while restricting some nonessential information. While operating in the secure mode, the device may restrict access to at least some information, at least temporarily. In some embodiments, the secure mode may require credentials, a decryption key, and/or other security information to enable continued use of the deployed device by the employee or possibly by the customer. The selection of the operational mode may be based at least in part on a deviation of the device'"'"'s location from a predetermined route.
20 Citations
20 Claims
-
1. A method of managing operation of a device, the method comprising:
-
determining a destination and boundary associated with one or more items to be picked up or dropped off at the destination; obtaining route information for a route to at least the destination, the route information including a threshold deviation of the route that is permissible; storing customer information and information about the one or more items as first privileged data on the device; storing the route information as second privileged data on the device; determining a current location of the device relative to the boundary and the route; causing the device to operate in an employee mode based at least in part on a determination by the device that the current location is outside of the boundary and within the threshold deviation of the route, operation in the employee mode at least causing display of at least some of the second privileged data; causing the device to operate in a customer mode based at least in part on a determination by the device that the current location is within the boundary, operation in the customer mode at least causing display of at least some of the first privileged data while restricting access of at least the second privileged data; and causing the device to operate in a secure mode based at least in part on a determination by the device that the current location is outside of the boundary and outside of the threshold deviation of the route, operation in the secure mode restricting access, at least temporarily, to the first privileged data and the second privileged data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification